libratbag A way to configure your input devices

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=iBhd2RnUZnA



Duration: 23:42
3 views
0


FOSDEM 2020 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-07-15Debugging and tracing a production RabbitMQ node
2022-07-15Debugging apps running in Kubernetes An overview of the tooling available
2022-07-15Debugging with LLVM A quick introduction to LLDB and LLVM sanitizers
2022-07-15Demonstration of the Sculpt Operating System
2022-07-15Design contributions to OSS Learnings from the Open Design project at Ushahidi Structuring in pers…
2022-07-15Designing a DSL with Kotlin
2022-07-15Designing a performant and scalable graph processing python package
2022-07-15Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo…
2022-07-15HOWTO build a product with OP TEE
2022-07-15Integrating new major components on fast and slow moving distributions How latest GNOME desktop was…
2022-07-15libratbag A way to configure your input devices
2022-07-15KiCad Back to the Future KiCad and its role in the growing open hardware movement
2022-07-15How secure is your build server a story of packages and trust
2022-07-15Is the web rea11y for all Firefox DevTools & A11y
2022-07-15Kernel Runtime Security Instrumentation LSMBPF=KRSI
2022-07-15Integrating Julius Speech Recognition Engine
2022-07-15How Yocto extra tools help industrial project Yocto is not only bitbake
2022-07-15How Safe is Asynchronous Master Master Setup
2022-07-15libliftoff status update Taking advantage of KMS planes
2022-07-15Lexemes in Wikidata structured lexicographical data for everyone
2022-07-15IoT Projects in FLOSS Foundations A report based on communities data



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering